This
OS has TOR wired though it, its the most secure OS ive seen so far,
they continue to update it (March 5th 2012 is the newest
update as of this post) And make it better. It is possible that it
has some bugs, but it should be nothing to serious, and ive
personally had no problems with it.

Just download this, and
burn it to a DVD-RW and boot it up! Its very nice, and even has an
ability to look like Windows, so nothing you do looks suspicious :D
(Go to System, Preferences, Appearance)

Sunday, February 26, 2012

Facebook dropped a serious BanHammer on many Anonymous, and Lulsec members a few days ago. Yes, i did say "Members" Deal with it!

Anyways, they deleted somewhere around 5,000 accounts, most Facebook pages and groups were lost as well, to include some of the "Anon" pages, but most of the "Anon" Pages were backed up with other accounts so their harder to get rid of :D

Ive been spending the last few days trying to get my account back, and setting up my new account. Once i get it completely set up, with a good URL and everything i will share it on here for everyone to add me, but as of right now search for "The Dyzaster" Or "Teh Dyzaster"

Sunday, February 19, 2012

So I was talking to a friend of mine,
and he said that I should talk about “LOIC” and “HOIC”. Me
and him both agree that many people believe that this is the best
Hacking Tool there is. They believe that when using this “tool”
they can not get caught. Im about to tell you the truth.

“DoS
attacks work by flooding the access routers with bogus traffic (which
can be e-mail or Transmission Control Protocol, TCP, packets).”

Ddos
is the same, but there are multiple IP's being used so depending on
how the attack is set up it might be difficult to locate the real
attacker. Here ill explain it a little bit more:

Ddos is a
Distributed Denial of Service. What this means is that there is many
computers working together to overload a website. This is usually
done by use of a botnet. A botnet is a server which holds
bots/zombies/victims. The person who controls this network of bots
can use these bots/zombies to Ddos a site, because of this many
machines who are Ddosing a computer do not get investigated because
it was by force and not by choice, but with how things are now people
are using HOIC and LOIC more and more, and the percentage of Ddos's
that are done by willing machines has gone up, and they are
investigating more and more every day.

When you study
HOIC/LOIC and virus's you see how they act, what kind of packets they
send and what kind of information is in those packets. Thats how they
catch you. If they see that your using HOIC/LOIC with a packet
sniffer then you are done for. Attacking a government website is
Treason, and soon instead of charging you for it they will have
Soldiers bust in your house to shoot you on site because its soon
going to be considered an act of terrorism.

“40 warrants out
for the arrest of members of the Hacker group known as
“Anonymous”

Do you remember seeing that back in the day?
The reasoning for it is that these people were either talking about
doing attacks, or got caught because they were at home using one of
these tools.

Though I do want to stress that using one of
these tools does NOT make you a Hacker, I still want to tell you how
to use these tools safely.

Heres how you use LOIC and HOIC
safely:

Use a Linux OS like BT5 or BlackBuntu (Or if you use
Linux on a day-to-day basis then use that)
Open (Or install)
macchanger (sudo apt-get macchanger-gtk” if your using a Debian
based OS, BT5 and BlackBuntu should already have this program
installed, but if they dont then install it with that command)
Now
that you have it installed open up a terminal and type:

iwconfig
It will say something like
this after you press “Enter”:
lo no wireless
extensions.

eth0 no wireless extensions.

wlan0 IEEE 802.11bgn ESSID:
“DisIsMyInterwebzConnection” (More information
will be here)You see
how “wlan0” has information behind it instead of saying “no
wireless extensions. ”? Thats good, that means that “wlan0” is
your wireless driver, it might look different “wlan1” or
something smiler, remember
this is for WiFi, not for Dial up or any Ethernet connection. You
should use WiFi because you will be at a location other then your
house, McDonalds or somewhere else that offers free internet to
customers (Make sure there are no cameras in the store before you go
there)

Now for the commands I enter next change “wlan0” to
whatever your drivers name is, if yours is “wlan0” then leave it
how it is.

Sudo ifconfig wlan0 down

(If you are
connected to the internet, you have just lost connection, you might
want to temporarly disable your ability to connect to the internet
because if it connects you automatically then you wont be able to do
the next commands)

Now type:macchanger –show wlan0This
will show something like this:Current MAC: 99:t5:g4:69:98:36
(unknown)

That shows your MAC Address, which is built into
your Wireless Card and is only yours, no one will have the same MAC
Address by default, only if they change it. Take note of the digits (
99:t5:g4:69:98:36) and see if it changes later

Sudo
macchanger-gtk

Wait a few seconds and this box should show up,
click the drop down next to “options” and press “Another (Any
kind)” Then for “Network interface” put “wlan0” or whatever
your interface is. Then press “Change MAC” and exit out

Now
type:macchanger –show wlan0 again and see if it changed, if it
did then it worked! If it didnt then type “sudo macchanger-gtk”
again and try until it works. There are times it will tell you its
successful when its actually not.

Now almost nothing can go
back to you, once you restart your computer your MAC Address will go
back to normal. As long as you dont allow shoulder no one will be
able to see what your doing, and you will be safe.

Be
careful, there are always ways for you to be taken down. One of the
most humorus ways is for you to run up to your friend and say “HEY
DUUUUUUDE I HACKERD THE GOVERNMENT!” Although Dosing and Ddosing is
not Hacking it is still illegal, do not get caught doing anything
illegal, and make sure that if you Ddos its for a reason and no “for
teh lulz”.Hopefully
this helped answer some questions and I hope it helps keep at least
the majority of people safe.

P.S. If you dont know how to get
BlackBuntu or BT5 then google “Backtrack5” “Blackbuntu” and
youll find the downloads, then burn the .ISO to a DVD-RW, put it in
your laptops CD/DVD drive and turn your computer off. When you turn
it on youll see a logo (“HP” “DELL” or whatever type of
computer you have) then press “ESC” “F10” “F12” Or
something smiler to boot up the DVD. After BT5 loads it will tell you
to type “startx” to start it, so do just that and then follow my
instructions.

~The Dyzaster

EDIT: Also, big_willy didnt
know that all this should be done on a network other then your own,
like a McDonalds that has no cameras in or around the store, or some
other place that offers open WiFi and has no cameras. I personally
use McDonalds because they have no cameras.

Friday, February 17, 2012

Today ill explain the group know
as “Anonymous” A bit more. In the past year or so things have
changed and Anonymous has changed.Originally Anonymous was
the voice of people which was heard but not seen. They fought for
the rights and freedoms of those all across the world. They have
done more for the people of this world then most governments
have.

Anonymous
does not “Exist” Just like “V” from the movie “V for
Vendetta” Anonymous is an idea, the idea of freedom. Its a voice
that speaks when most wont or cant. They ARE however full of real
people who hide behind identities and masks. I know what most of
you are thinking: “Why hide when you fighting for what you
believe in?” Or “God their pussies, hiding behind a god damn
mask, they got no balls, NOOO BAAAAALLS!"

1. The mask
represents an idea and is what Anonymous is all about. Freeing the
people from tyrant governments who abuse or mistreat their citizens.

2. They hide their identity because their going
against people who will have them killed for it. Some things that
they do are considered treason (Like Ddosing FBI.gov which happened
recently... Many times recently) And if they reveal who they are
they will do time or be punished for Treason.

Now this was
Anonymous a while back, as of right now they do very idiotic
things. They had beef with Sony for a legit reason a year or so
ago, they broke into Sony's server and did a lot of god for the
users of Sony! They showed how shitty Sony was treating you and how
un-secure they left all of your information. Now they attack Sony
for no reason, the point has been proved and Sony is better now,
but they continue to attack out of boredom. They do this with many
sites and corporations. Back in the day there were actual Hackers
in Anonymous (Though Anonymous says its not a group, by definition
it IS), who did good and worked their asses off, but then a bunch
of people who know nothing about computers and who are unwilling to
learn jumped in with dreams of becoming one of the UBER HAXORS they
see in movies and on T.V.

This is why Anonymous has went to
shit and many of the true Anons have left. I for one no longer affiliate
myself with Anonymous and neither do many of the people I know. I
still represent what they do but I make my OWN movement with more
order and I still fight for the same rights as Anonymous.

Because
of the actions Anonymous has made I do not recommend affiliating
yourself with them, this is however up to you.

Thats explaining Anonymous a bit.. I wont let them have much more of
my time. I hope you make your choices very carefully, maybe join a
group that is like Anonymous but thats better. Though it might
sound stupid to many, but a Democracy would help a group like this
be more organized and make them heard more. Yes Democracy in
America and some other countries have went bad, but they were
corrupted by politicians, not by the everyday citizen. We could run
it better then they could, were not power or money hungry. Thats
just something to look into, or think about.

Sunday, February 12, 2012

This time I want to talk about
“Hacking” Im not going to break it down as much as possible but I
am going to explain things so new “Hackers” Can understand what
Hacking is and what it means.

Most people who are viewing this
have most likely Ddosed before. I want to start pointing out that
Ddosing is not Hacking, if you wrote the program yourself then you
can still be considered a “Hacker” but you are not Hacking.
Confused? Let me explain.

The term “Hacker” Was used back
in the day to define or explain a lumberjack. After years of it being
used for that, MIT (Yes, the college) Used it to describe someone who
knows the “Ins and outs” Of a train engine. An expert. Those who
knew more then most people about trains. Sometime down the road it
started to mean the same thing, but only with a different system.
With a “Computer System”. The term “Hacker” now defines
someone who is able to manipulate a Computer System to do whatever he
or she wants.

With that being said, “Hacking” is not
necessarily braking into someones server, or cracking someones WiFi.
It is much more then that. As long as you know enough about a
computer to control it and make it do anything you want, you ARE a
Hacker. Yes Hacking into someones shit does most the time make you a
Hacker, because you are breaking the rules of that system and you
made it do what you wanted it to do, but another type of Hackers are
programmers. You know the guys that made “Open Office”? Though
they might not have Hacked their computer to make the code, but the
fact that they know enough of whatever programming language that was
used to make a program like this means they know the program enough
to write small codes or programs to do anything they want. So they
are considered Hackers.

The reason Ddosing is NOT considered
(And never will be) Hacking is because you do nothing but send empty
packets to a site. Its like pressing refresh over and over and over
and over and over (And it doesnt stop). Or its like pinging a site.
You are doing no damage by yourself, but if you have zombies helping
you then you can overload a site and take it down as long as the
attack continues, if your real lucky it will last even after the
attack is finished. This is usefull for groups like Anonymous and
Antisec to make a statement but it is NOT Hacking. If you really want
to Hack a site then you must learn SQLI Which is pretty simple if you
have time to read.

Now that ive explained what “Hacking”
is, I can describe the 3 different types of Hackers:

White
Hat: These are the good guys. Their the one who might Hack something
small like a website you or I own, or they might Hack the pentagon
itself (Yes it has been done by a White Hat). However they do not do
any damage. They find out whats wrong and either fix it themselves,
let the owner of whatever it was they Hacked know whats wrong and
offer to fix it for free, or some just take note of the vulnerability
for fear that the owner will press charges if they find out. Some are
also CEH's (Certified Ethical Hackers) And actually Pentest for a
living. This is where they go into a business's building and Hacks
them with permission. They test physical and electronic security and
make corrections when needed.

Black Hat: These are the bag
guys. They Hack for bad reasons, money, power, fun, jokes, or for no
reason at all. They do real damage, defacing websites, deleting
everything off a whole server, they are the ones that make the bad
virus's and rouge programs.

Grey Hat: This is a mix of White
Hat and Black Hat. Some do White and Black Hacks equally but most are
White Hats who like to play a prank or have fun and deface something
every once and a while. It all depends on the person, but they do
both Black and White Hat Hacks.

Those are the 3 different
types of Hackers. You can break down Hacking even more but I might do
that in a later post. If you have any comments or suggestions please
feel free to comment here or on Facebook